Mon, Mar 1 09:10 - 10:50 |
(1) ICSS |
09:10-09:35 |
Developing and Characterizing a New Approach to Extracting Communication Sessions Associated with NIDS Alerts |
Ryosuke Ishibashi, Hiroki Goto (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) |
(2) ICSS |
09:35-10:00 |
Detection of Infected Device Using DNS Traffic |
Soichiro Kogo, Atsushi Kanai (Hosei Univ.) |
(3) ICSS |
10:00-10:25 |
Understanding the Adoption and Operation of DNS Cookie: Current State and Future Prospects |
Masanori Yajima (Waseda Univ.), Daiki Chiba (NTT), Yoshiro Yoneya (JPRS), Tatsuya Mori (Waseda Univ./NICT) |
(4) ICSS |
10:25-10:50 |
Construction of Vulnerability Evaluation System with Machine Learning Methods |
Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR) |
|
10:50-11:05 |
Break ( 15 min. ) |
Mon, Mar 1 11:05 - 12:20 |
(5) ICSS |
11:05-11:30 |
A proposal of model for scale and frequency of cyber incidents based on organizational attributes |
Kazuki Ikegami, Hiroaki Kikuchi (Meiji Univ.) |
(6) ICSS |
11:30-11:55 |
Method of Similarity Evaluation among Incidents for Multi-Located Network |
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) |
(7) ICSS |
11:55-12:20 |
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures |
Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) |
|
12:20-13:40 |
Lunch Break ( 80 min. ) |
Mon, Mar 1 13:40 - 14:55 |
(8) |
13:40-14:05 |
|
(9) |
14:05-14:30 |
|
(10) ICSS |
14:30-14:55 |
A path authentication framework based on One-way cross networks |
Kosuke Ishibashi, Masakazu Soshi (Hiroshima City Univ.) |
|
14:55-16:00 |
Break ( 65 min. ) |
Mon, Mar 1 16:00 - 18:00 |
(11) |
16:00-18:00 |
|
Mon, Mar 1 09:10 - 10:50 |
(12) ICSS |
09:10-09:35 |
On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures |
Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT) |
(13) ICSS |
09:35-10:00 |
A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background |
Satoki Tsuji, Ryusei Ishikawa (Ritsumeikan Univ.), Masashi Eto (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Hiroshima City Univ.) |
(14) ICSS |
10:00-10:25 |
Implementation and Evaluation of a Plagiarism Detection Method for Source Code on Programming Contest |
Ryusei Ishikawa (Ritsumeikan Univ.), Yuichi Hattori (Secure Cycle), Hiroyuki Inoue (Hiroshima City Univ.), Atsuo Inomata (Osaka Univ.) |
(15) ICSS |
10:25-10:50 |
Design and implementation of a cyber security exercise rewinding mechanism |
Yuma Kodera, Chinen Kenichi (JAIST) |
|
10:50-11:05 |
Break ( 15 min. ) |
Mon, Mar 1 11:05 - 12:20 |
(16) |
11:05-11:30 |
|
(17) |
11:30-11:55 |
|
(18) |
11:55-12:20 |
|
|
12:20-13:40 |
Lunch Break ( 80 min. ) |
Mon, Mar 1 13:40 - 15:20 |
(19) ICSS |
13:40-14:05 |
An Evaluation of Scalable Clustering in Fast Construction Algorithm of Phylogenetic Tree |
Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.) |
(20) ICSS |
14:05-14:30 |
Improvement of Functional Difference Investigation Method and Analyzing for Clusters of IoT Malware |
Reo Kawasoe (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) |
(21) ICSS |
14:30-14:55 |
Analyzing the Transition of Vulnerabilities Targeted by IoT Malware |
Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) |
(22) ICSS |
14:55-15:20 |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox |
Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) |
|
15:20-16:00 |
Break ( 40 min. ) |
Tue, Mar 2 09:35 - 10:50 |
(23) ICSS |
09:35-10:00 |
Proposal for Chameleon Hash with a Revocation Function |
Koki Matsubara (Osaka Univ.), Atsuko Miyaji (Osaka Univ./ JAIST), Tian Yangguang (Osaka Univ.) |
(24) ICSS |
10:00-10:25 |
Authentication and authorization of IoT devices using blockchain and fog nodes |
Takahiro Igarashi, Yuichi Futa (TUT) |
(25) ICSS |
10:25-10:50 |
Consideration on the mechanism of identifying and tracking Bitcoin users |
Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) |
|
10:50-11:05 |
Break ( 15 min. ) |
Tue, Mar 2 11:05 - 11:55 |
(26) ICSS |
11:05-11:30 |
Study on analyzing Memcached DRDoS attacks and their infrastructures |
Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(27) ICSS |
11:30-11:55 |
Distributed Slow HTTP DoS Attack Detection by Combining Multiple Schemes |
Koki Tamura, Yuichi Futa (TUT) |
|
11:55-13:40 |
Lunch Break ( 105 min. ) |
Tue, Mar 2 PM 13:40 - 15:45 |
(28) ICSS |
13:40-14:05 |
Research on the vulnerability of homoglyph attacks to online machine translation system |
Takeshi Sakamoto, Tatsuya Mori (Waseda Univ) |
(29) ICSS |
14:05-14:30 |
Developing an Interactive Analysis System for Voice Assistant Apps |
Atsuko Natatsuka (Waseda Univ.), Ryo Iijima (Waseda Univ./NICT), Takuya Watanabe, Mitsuaki Akiyama (NTT), Tetsuya Sakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT) |
(30) ICSS |
14:30-14:55 |
|
|
(31) ICSS |
14:55-15:20 |
Security Evaluation of End-to-End Encryption of LINE Version 2 |
Kotaro Kita, Takanori Isobe (UH) |
(32) ICSS |
15:20-15:45 |
The linear probability of the stream cipher Salsa |
Junru Li (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) |
|
15:45-16:00 |
Break ( 15 min. ) |
Tue, Mar 2 PM 16:00 - 16:50 |
(33) ICSS |
16:00-16:25 |
Evaluation of resonance-induced attacks on inertial measurement unit |
Yuta Minamisawa, Ryo Iijima (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT) |
(34) ICSS |
16:25-16:50 |
Security Evaluation of PUF utilizing Unrolled Architecture |
Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa (Meijo Univ.) |
Tue, Mar 2 AM 09:10 - 10:50 |
(35) ICSS |
09:10-09:35 |
A Study on the Adoption of Link Preview by the Phishing Sites |
Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) |
(36) ICSS |
09:35-10:00 |
An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log |
Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(37) ICSS |
10:00-10:25 |
Evaluation of Uncertain Reports by Multiple Anti-virus Engines |
Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT) |
(38) ICSS |
10:25-10:50 |
Proof of concept of sandbox evasion attack using email address stored in target machine |
Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
|
10:50-11:05 |
Break ( 15 min. ) |
Tue, Mar 2 AM 11:05 - 11:55 |
(39) ICSS |
11:05-11:30 |
Accuracy evaluation of CNNs and random forests with Malware API call sequences |
Shugo Asai, Futa Yuichi (TUT) |
(40) ICSS |
11:30-11:55 |
Detecting unknown malware families by anomaly detection using deep learning |
Ren Takeuchi, Shintaro Mizuno, Vo Ngoc Khoi Nguyen, Jun Tsuchiya, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) |
|
11:55-13:40 |
Lunch Break ( 105 min. ) |
Tue, Mar 2 PM 13:40 - 15:45 |
(41) |
13:40-14:05 |
|
(42) |
14:05-14:30 |
|
(43) |
14:30-14:55 |
|
(44) |
14:55-15:20 |
|
(45) |
15:20-15:45 |
|
|
15:45-16:00 |
Break ( 15 min. ) |
Tue, Mar 2 PM 16:00 - 18:05 |
(46) |
16:00-16:25 |
|
(47) |
16:25-16:50 |
|
(48) |
16:50-17:15 |
|
(49) |
17:15-17:40 |
|
(50) |
17:40-18:05 |
|